Structure of internet servers address, Computer Networking

Assignment Help:

In a client's software , the structure of an Internet server's address keyed is as follows:

Where:

  • http refer for the communication protocol to be used
  • www refer for the notation for World Wide Web
  • .Microsoft is the registered domain Name linked with the IP address of an Internet Server.
  • .com the server provides commercial services to clients who link to it.

 

To help to speed up access, its IP address can be represented directly in form of numbers. 127.57.13.1 rather than the domain name, microsoft.com. In this particular case no name resolution needs to occur.

An Internet address is a unique 32-bit number i.e. expressed typically as four 8-bit octets, with each octet separated through a period. Each octet can take on any number from 0 through 255.


Related Discussions:- Structure of internet servers address

Determine theoretical data capacity of the wireless channel, Consider a sim...

Consider a simple wireless data link using channel bandwidth of 40 kHz. The transmit power level is 20 dBm, the link attenuation is 40 dB and the SNRdB at the receiver is 20 dB.

Method of ip multicasting or multicast ip address, Can you describe the con...

Can you describe the concept of IP multicasting or multicast IP address?

Describe any good security technology, Describe any good security technolog...

Describe any good security technology A good security technology should be powerful enough to support the features that the administrators need, including rules validation to i

Command that forces the router to load into ROM, Determine the command that...

Determine the command that forces the router to load into ROM mode upon a reload?  Ans) boot system rom ia the command that forces the router to load into ROM mode upon a reload

What are super servers, These are fully-loaded machines which consists of m...

These are fully-loaded machines which consists of multiprocessors, high-speed disk arrays for interview I/O and fault tolerant features.

What are triggers and rules, Triggers are special user defined actions usua...

Triggers are special user defined actions usually in the form of stored procedures, that are automatically requested by the server based on data related events. It can perform diff

Message passing libraries mpi and pvm, In this part, we shall talk about ab...

In this part, we shall talk about about message passing libraries. In history, various message passing libraries have been available since the 1980s. These executions differed subs

Which statement best defines access list placement, When using access lists...

When using access lists, it is important where those access lists are placed. Which Statement best defines access list placement Ans) Put standard access lists as near the desti

Distributed Algorithms, can we solve the problem using bounded buffer space...

can we solve the problem using bounded buffer space if the propagation delay is arbitrarily large ?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd